
Abstract In a paper an application of the architecture evaluation method used for prediction the effects of incidents for information security which is inside of Information and Communication Technology (ICT) system is described. As a base, the ATAM method is taken. During the analysis there is shown, that direct use of the ATAM technique is impossible, because it use only one set of data. Use just one view of ICT system is not adequate for measure the influence of incident on information security, which is inside ICT system. A tool which is useful for assessment effects of incidents, is an incidence matrix that presents logical connections between elements of ICT system. Knowledge of logical connections and structures of the messages being exchanged enables an assessment of operation the elements which receive modified messages.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
